Policies:

Acceptable Use Policy (AUP)

Computech
respects that the Internet provides a forum for free and open
discussion and dissemination of information, however, when there are
competing interests at issue, Computech reserves the right to
take certain preventative or corrective actions. In order to protect
these competing interests, Computech has developed an Acceptable Use
Policy ("AUP"), which supplements and explains certain terms of each
customer's respective service agreement and is intended as a guide
to the customer's rights and obligations when utilizing Computech’s
services.

This AUP will be revised from time to time. A
customer's use of Computech after changes to the AUP are posted on
Computech’s web site, http://www.Computech.com.au/,
will constitute the customer's acceptance of any new or additional
terms of the AUP that result from those changes.

One
important aspect of the Internet is that no one party owns or
controls it. This fact accounts for much of the Internet's openness
and value, but it also places a high premium on the judgment and
responsibility of those who use the Internet to disseminate
information to others.

When information is disseminated through the Internet, they also
must keep in mind that Computech does not review, edit, censor, or
take responsibility for any information its clients may create. When
users place information on the Internet, they have the same
liability as other authors for copyright infringement, defamation,
and other harmful speech.

Also, because the information they
create is carried over Computech’s network and may reach a large
number of people, including both clients and non-clients of
Computech, clients' postings to the Internet may affect other
clients and may harm Computech’s goodwill, business reputation, and
operations. For these reasons, clients violate Computech policy and
the service agreement when they, their customers, affiliates, or
subsidiaries engage in the following prohibited activities:

Computech allows CGI to be used on all Virtual
Servers. CGI can be resource intensive however, and because a
Virtual Server must be shared with other users, we must limit how
much of the CPU can be used by any one account on a shared server.
There are several reasons why Computech has created its CGI Abuse
policy for its virtual server users.

What does Computech consider "CGI
ABUSE"?
Any site whose CGI programs are using
excessive amounts of system resources. Excessive amounts is
defined as any amount that results in substantial degradation
of server performance. Computech is the sole determinant of
what consititues degraded server performance.

Due to their use of flat files instead of databases,
Computech does not allow the use of UBB or YABB bulletin
boards (flat files versions). Use of these boards for large or
very active forums, results in system performance degradation,
and cannot be allowed in our shared server environment.
Computech suggests using VBulletin or phpBB as a more
efficient, database-driven alternative to these bulletin
boards.

Why does Computech have this policy? Server Speed and Fairness to others A
Virtual Server is shared. As such, there are many accounts per
machine. In all fairness, Computech cannot allow one or two
clients to use all of the System resources on a shared machine
and have all other clients on the machine suffer because of
it. Excessive CPU usage by one or more clients causes extreme
slowness in all areas: FTP, Telnet, Web Sites and more. If the
CPU usage gets too far out of hand, all sites hosted on the
machine will return Errors and not be accessible in any
way.

What happens if I violate this
policy?All accounts that are found to using
excessive amounts of system resources will receive an email
warning from Computech. This warning will inform you that
there is too much CGI running and it will provide options for
reducing the usage or upgrading your server. If you do not
reduce the usage within 24 hours of the email being sent, your
CGI scripts will be disabled.

Spamming
Sending unsolicited bulk and/or
commercial messages over the Internet (known as "spamming"). It is
not only harmful because of its negative impact on consumer
attitudes toward Computech, but also because it can overload
Computech's network and disrupt service to Computech clients. Also,
maintaining an open SMTP relay is prohibited. When a complaint is
received, Computech has the discretion to determine from all of the
evidence whether the e-mail recipients were from an "opt-in" e-mail
list. Refer to our SPAM Policy for more information.

Intellectual Property Violations
Engaging in any activity that infringes or
misappropriates the intellectual property rights of others,
including copyrights, trademarks, service marks, trade secrets,
software piracy, and patents held by individuals, corporations, or
other entities. Also, engaging in activity that violates privacy,
publicity, or other personal rights of others. Computech is required
by law to remove or block access to customer content upon receipt of
a proper notice of copyright infringement. It is also Computech’s
policy to terminate the privileges of customers who commit repeat
violations of copyright laws.

Defamatory or Abusive Language
Using Computech’s network as a means to transmit or
post defamatory, harassing, abusive, or threatening language.

Forging of Headers
Forging or misrepresenting message headers,
whether in whole or in part, to mask the originator of the message.

Illegal or Unauthorized Access to Other Computers or
Networks
Accessing
illegally or without authorization computers, accounts, or networks
belonging to another party, or attempting to penetrate security
measures of another individual's system (often known as "hacking").
Also, any activity that might be used as a precursor to an attempted
system penetration (i.e. port scan, stealth scan, or other
information gathering activity).

Background Running Programs
Background Daemons in general are prohibited on
Computech servers, including, but not limited to, IRC bots, eggdrop,
BitchX, XiRCON, warez sites and any other program that interferes
with normal server operation.

Computech will be the sole arbitor of what consitutes a violation
of the above policy.

Distribution of Internet
Viruses, Worms, Trojan Horses, or Other Destructive
Activities
Distributing information regarding the
creation of and sending Internet viruses, worms, Trojan horses,
pinging, flooding, mailbombing, or denial of service attacks. Also,
activities that disrupt the use of or interfere with the ability of
others to effectively use the network or any connected network,
system, service, or equipment.

Facilitating a Violation of this AUP
Advertising, transmitting, or otherwise
making available any software, program, product, or service that is
designed to violate this AUP, which includes the facilitation of the
means to spam, initiation of pinging, flooding, mailbombing, denial
of service attacks, and piracy of software.

Export Control Violations
Exporting encryption software over the Internet
or otherwise, to points outside the United States.

Other Illegal Activities
Engaging in activities that are determined to be
illegal, including advertising, transmitting, or otherwise making
available ponzi schemes, pyramid schemes, fraudulently charging
credit cards, and pirating software.

Other Activities
Engaging in activities, whether lawful or
unlawful, that Computech determines to be harmful to its clients,
operations, reputation, goodwill, or customer relations.

As we have pointed out, the responsibility for avoiding the
harmful activities just described rests primarily with the client.
Computech will not, as an ordinary practice, monitor the
communications of its client to ensure that they comply with
Computech policy or applicable law. When Computech becomes aware of
harmful activities, however, it may take any action to stop the
harmful activity, including but not limited to, removing
information, shutting down a web site, implementing screening
software designed to block offending transmissions, denying access
to the Internet, or take any other action it deems appropriate.

Computech also is concerned with the privacy of on-line
communications and web sites. In general, the Internet is neither
more nor less secure than other means of communication, including
mail, facsimile, and voice telephone service, all of which can be
intercepted and otherwise compromised. As a matter of prudence,
however, Computech urges its clients to assume that all of their
on-line communications are insecure. Computech cannot take any
responsibility for the security of information transmitted over
Computech’ facilities.

Computech will not intentionally monitor private electronic mail
messages sent or received by its clients unless required to do so by
law, governmental authority, or when public safety is at stake.
Computech may, however, monitor its service electronically to
determine that its facilities are operating satisfactorily. Also,
Computech may disclose information, including but not limited to,
information concerning a client, a transmission made using our
network, or a web site, in order to comply with a court order,
subpoena, summons, discovery request, warrant, statute, regulation,
or governmental request. Computech assumes no obligation to inform
the client that client information has been provided and in some
cases may be prohibited by law from giving such notice. Finally,
Computech may disclose client information or information transmitted
over its network where necessary to protect Computech and others
from harm, or where such disclosure is necessary to the proper
operation of the system.